The blog posts give you an in-depth understanding of Torizon, its advantages, use cases, the latest updates, and developments.
Performance Impact of Docker Containers on Linux
In this article, we will explore some of the variables, and highlight some common mistakes and the best practices for creating and developing your containers with performance in mind. The goal here is not to show if the same-performance premise actually reflects real-life applications, but instead to show how you can get the most out of your container to make the Docker overhead virtually nonexistent. Lastly, we will also showcase some possible issues that may arise when starting multiple containers at once and how all of this affects memory and boot time.
Upstream First - Toradex Mainline Kernel Support is a Reality
The quality of our hardware and software is well known, and we are committed to open-source initiatives in most projects across our product line. We are an active contributor to the Linux kernel in particular and, in keeping with this, recently changed our strategy to commit everything possible to the mainline Linux kernel — we are now enthusiastically "Upstream First."
Flash Health Monitoring on Torizon
Hey there, Leo here! Some years ago, I worked on an innovation project - by now archived - named Flash Analytics Tool. One of the project goals was to research and apply methods to estimate flash memory lifespan on Embedded Linux - more specifically, using Torizon in its early days - thus helping our customers develop flash-friendly applications and get an estimate of how long they could expect their devices to withstand in the field.
IoT Security Blog Series Part 3
Software update security: Common mistakes
This is part 3 of our 7-part series about over-the-air software updates. In part 1, we told you about all the reasons it’s important to be able to deliver software updates remotely, and in part 2 we wrote about all the reasons software update systems are dangerous. Today, we’re looking at ways to protect your software update system that might seem secure at first glance, but aren't—with famous real-world failures for each example.
Flutter on Torizon - A PoC Setup for i.MX 8M Plus
For some time already, Flutter has been quite successful as a native HMI and Application technology on the Web, Mobile Phones, and even for Desktop. Developers love the programming language, its performance, and the outstanding feature richness (e.g., the ability to create performant and custom animations of any complexity). It is extensively used by Google internally. Moreover, with its attractive BSD license, it has been used by many independent software development vendors meanwhile.
Building Embedded Solutions with Modern Software Tools
When project managers hear a project involves writing embedded software there is an expectation that a software developer with very specialized skills will be required to work on the project. Embedded software development historically requires a developer with both an electrical engineering and computer science background, writing software and firmware in a low-level language like C or C++, acquiring expensive software development tools, and typically the developed user interface will be rudimentary by modern GUI standards.
IoT Security Blog Series Part 2:
The dangers of remote updates
This is part 2 of our 7-part series about over-the-air software updates. In part 1, we told you about all the reasons it’s important to be able to deliver software updates remotely - in today’s world, you can’t keep any connected device secure unless you can update it. Today’s post, though, goes in the opposite direction: we’re going to look at why software update systems can be incredibly dangerous, and why you should treat them with skepticism and caution.
IoT Security Blog Series Part 1:
Why do we need remote updates for connected devices?
With the explosion of internet-connected devices in recent years, there has been an industry-wide realization of the need to keep these devices updated throughout their lifetime. This is the first part of a series that will explore the concept of remote over-the-air (OTA) updates, providing designers details they will need when implementing remote OTA update solutions into their systems. We will especially focus on the important security aspects. We’ll start with the basics.